Tag: IOUG

To properly secure an Oracle database requires significant effort and often expensive security add-on products.  The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero or low-cost solutions are available.  The Thrifty DBA will show you thrifty yet effective auditing and logging solutions for the…

In this session I will share some of experience on migrate or upgrading different versions of Oracle databases to the Oracle 12cR2. This session will discuss the difference between upgrade and upgrade when you should use which method. We will also focus the latest 12cR2 upgrade tools and various upgrade 12cR2 paths/methods that help you…

Oracle 12.1 Multitenant  offers cost effective, high database consolidation density coupled with excellent isolation.  The Oracle 12.2 Multitenant new feature called Application Containers significantly improves agile application deployment and  management at scale.  When used in accordance with best practices, Application Containers plays a vital part in agile development for Continuous integration-Continuous Delivery (CICD) application development models.  This session will introduce the basic…

Do you want to surf a tidal wave of performance? Oracle Database In-Memory, with its industry-first dual row/column in-memory format has you covered! In this session we will introduce Database In-Memory and review some of its class leading technologies that enable billions of rows per second analytic data access while simultaneously enabling superfast OLTP performance.…

The open source streaming data platform, Kafka, is taking the world by storm. In their own predictions for 2017 Oracle even asserted that “Kafka looks to be the runaway Big Data technology of 2017”. This being the case there's no better time to start learning it. So what is it? Well, technically speaking it is…

Encrypting data is a useful tool to protect sensitive data be it at rest, in motion, or in use. For an Oracle Database, encryption may be done at the storage, application, network, and backup layers. Therefore, implementing database encryption can be time consuming and difficult as there are performance considerations and challenges such as effective…

In this session learn about making your applications highly availability, with no application knowledge and no application changes This session will teach you about configuring your applications for high availability using Services, FAN, drain points, and Application Continuity.  The session covers tuning for zero brownout with RAC and Active Data Guard and how to know…

Proper design of an application includes security plans, which ensure that specific data is available only to specific user groups. Application design should also include security plans for guarding against data or application tampering. These two aspects can easily be set aside while developers are caught up in the process of developing PL/SQL code to…

Implementing RAC with Data Guard?  Maybe on an Exadata or ODA?  Ever wonder: how do I quickly and easily check the status of all of my databases?  How do I easily report on space usage by database in ASM?  Should I configure Data Guard to use the SCAN listener?  Where and how should I run…

Big Data is growing exponentially, requiring massive-scale infrastructure however, business analytics has shifted from reactive to proactive analysis; this is the era of streaming data (a.k.a. Fast Data). Apache Hadoop is very good for analyzing data at rest but cannot handle streaming data. Big Data analytics needs new Big data frameworks. Apache Spark brings in-memory processing and…